A tag is a keyword or label that categorizes your question with other, similar questions. Using the right tags makes it easier for others to find and answer your question.

Type to find tags:
× 605
the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
× 553
the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable …
× 490
Network Security - securing network infrastructure and connections
× 485
accessed over a network such as the Internet or an intranet using a browser.
× 464
Specific to the security of passwords: hashing, entropy, cracking, resets, lockouts, etc.
× 430
SSL (Secure Sockets Layer) and/or TLS (Transport Layer Security)
× 414
Authentication - establishing the authenticity of a person or other entity. Not to be confused with authorization - defining access rights to resources.
× 390
Application security - Specific to securing an application rather than the connection, infrastructure, browser etc
× 262
A family of graphical operating systems produced by Microsoft. Windows includes both server and destop operating systems. Early versions relied on MS-DOS while current versions have evolved from Windo…
× 241
a function which takes a variable size input and produces a fixed size output. The algorithm tries to make it difficult to predict the output for a given input, find two inputs wit…
× 205
an application which uses http and related protocols to retrieve HTML and XML data from servers. As the web has become a critical source of information and communication, web browsers…
× 204
A piece of data used in public key cryptography that contains identifying information (i.e. email address or web address), a hash of a public key, and a digital signature that authenticates the data i…
× 199
An attempt by a threat to exploit a weakness in a system.
× 188
An attempt to penetrate a system's security in an effort to evaluate the protections in place.
× 186
Securing Linux systems and applications; understanding Linux security features.
× 166
Concerned with software or hardware firewalls
× 155
any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator…
× 155
Related to email protocols, clients, servers, content, and message format.
× 151
Security aspects concerning code written in the programming language PHP which is often used for web applications.
× 149
to deliver web pages on request to clients.
× 143
The attribute of a system that prevents the release of data to unauthorized individuals. The ability or expectation of an individual or group to reveal information about themselves selectively or n…
× 142
Security in mobile devices. Issues concerning regular cellphones, smartphones, tablet computers and other portable information devices all fit into this category.
× 141
Security for 802.11 wireless networks.
× 138
The functions performed by the person or processes responsible for security of passwords on a given system.
× 118
The data, tools, and procedures which, when applied to a specific vulnerability, predictably violate the security design of a system.
× 115
the software component that provides abstraction of physical hardware, and provides a generalized model for application software to execute without the need for specific hardwa…
× 112
prevention of an attack vector (e.g. XSS, HPP, CSRF)
× 102
known to the designers, implementers, or operators of the system, but has not been corrected.
× 99 × 98
a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
× 98
Key management involves the entire key life-cycle: generation, exchange, storage, safeguarding, use, vetting, revocation, replacement and retirement.
× 97
Definition: HTTP - the Hypertext Transfer Protocol - provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical specification of a network protocol that sof…
× 94
Tools used by security professionals
× 91
A security mechanism which enforces policy describing which requesters may perform operations on specified objects. There are typically multiple types of operations. Common operations include: read, w…
× 90
The common name for the language used primarily for scripting in web browsers. It is not related to the Java language. Standardized as ECMAScript, its dialects/implementations include JavaScript and J…
× 89
Cross-Site Scripting: An attack method that involves injection of code or markup into a webpage.
1 2 3 4 5 14